• Home
  • Trends + Spotlights
  • Politics + Issues
  • Celebrities
  • Hobbies + Interests
  • Rumor Cop
Search
Powered by Philstar.com
Interaksyon Interaksyon Interaksyon
  • Home
  • Trends + Spotlights
  • Politics + Issues
  • Celebrities
  • Hobbies + Interests
  • Rumor Cop

ICT UPDATE | Reignite your firewall to block ransomware

By
Interaksyon
-
September 25, 2017
4505
Share
Facebook
Twitter

    SPONSORED ARTICLES

    How logistics industry experts plan to ‘move forward’ after COVID-19

    Reasons why Filipinos love Korean culture and products

    Eagle Point Resort in Batangas

    Why Batangas is the destination for budget-friendly family holidays

    Wana Tun, global solution engineer at Sophos. Photo by Rendy Aryanto/VisualVerve.SG. Used with permission
    As cyberthreats continue to evolve rapidly, it is important for firewalls to be upgraded to protect against these threats.

    Today, even in the most diligent organizations, there is usually a gap between the discovery of a vulnerability and the patching deployed, which can put the company at risk of a security lapse. This is why a next-generation firewall is essential to provide enterprises with a strong first line of defence against advanced threats.

    In all next-generation firewalls, there is a critical security component known as Intrusion Prevention System (IPS), which performs deep packet inspection of network traffic to identify and block exploits before they reach a target host. In addition, a next-generation firewall also includes an essential security layer known as cloud-based sandboxing technology, which detects weaponised documents that lurk in common files like Microsoft Office documents and PDFs. It identifies suspicious files at the gateway and sends them to a safe sandboxing infrastructure in the cloud to detonate active content and monitor the behaviour over time.

    Having said this, it is important to keep in mind that IPS and sandboxing are only effective against traffic that is moving across the firewall. Hence, there are some best practices to pursue in order to prevent the spread of worm-like attacks on the network.

    Recommended best practices:

    – Ensure you have the right protection, including a modern, high-performance next-generation firewall IPS engine and sandboxing solution;

    – Do thoroughly review the network and eliminate non-essential open ports accessible from outside, as open service ports are susceptible to attack, and a potential avenue for spreading worms. Therefore, where possible, it is recommended to use VPN to access resources on the internal network from outside

    – Secure both ingress and egress traffic with appropriate IPS profile;

    – Apply sandboxing to web and email traffic to ensure all suspicious files coming through web downloads and email attachments are being analysed for malicious behaviour before they get into your network;

    – Minimize the risk of lateral movement within the network by segmenting local area networks (LANs) into smaller, isolated zones or virtual local area networks (VLANs) that are secured and connected together by the firewall. Also, apply suitable IPS policies to the rules governing the traffic across the LAN to prevent exploits, worms and bots from spreading between LAN segments.

    – Automatically isolate infected systems. When an infection hits, it is vital that your security solution quickly identifies compromised systems and isolate them until they can be cleaned up, either automatically or through manual intervention.

    As ransomware, botnets, and other advanced attacks are capable of spreading through the entire IT infrastructure, it is crucial for the firewall and the endpoint to communicate and share meaningful information about suspicious and confirmed bad behaviour.

    Although this was not possible in the past, today, through the Sophos Synchronised Security approach, the endpoint and network can act as one integrated system to communicate information in real-time. This means enterprises can prevent, detect, investigate and remediate threats easily with minimal effort. In the past, this type of discovery and incident response would usually take weeks or months but is now reduced to seconds with synchronised security.

    For organizations that do not have the luxury of extensive in-house security teams, the synchronized security approach can help bolster productivity while streamlining security operations and IT security management. As it delivers better protection and manageability, organisations of any size can also stay ahead of coordinated and sophisticated attacks.

    Interaksyon
    • TAGS
    • byline
    • cyber security
    • Sophos
    Share
    Facebook
    Twitter
      Interaksyon

      RELATED ARTICLESMORE FROM AUTHOR

      Cybercriminals use sensitive data to extort money from wealthy companies — tech firm

      Gov’t urged to develop cyber-resiliency vs constantly evolving cyber threats

      Banquet hosted by the Prime Minister of Japan Shinzo Abe

      Newspaper called out for placing Duterte’s name in wire report on Japan royal event

      Cyber security

      Philippine central bank beefs up cyber security rules

      World security leaders rely on AI, machine learning to defend against threats

      Hackers stole $6 million in attack on SWIFT system, Russian central bank says

      LATEST

      • ‘Real solutions’: Jake Ejercito calls for basic dignity for teachers crossing river in Sarangani
      • Binondo’s flavors: Celebrate Manila Day with these 4 foodie finds
      • Report: Rockets to acquire Kevin Durant from Suns
      • Pope tells politicians that AI should serve human beings, not replace them
      • Maynilad delays IPO listing to October
      • Erwan Heussaff’s ‘champion of Filipino cuisine’ title brings reading comprehension into focus
      • Explainer: Key facilities in Iran’s nuclear program
      Interaksyon
      About Us | Contact Us
      Unit 909 and 910, The Infinity Tower, 26th Street, Bonifacio Global City, Taguig City
      © 2025 Philstar Global Corporation.